This paper proposes a novel tamper detection, localization, and recovery scheme for encrypted images with Discrete Wavelet Transformation (DWT) and Compressive Sensing (CS). The original image is first transformed into DWT domain and divided into important part, that is, low-frequency part, and unimportant part, that is, high-frequency part. For low-frequency part contains the main information of image, traditional chaotic encryption is employed. Then, high-frequency part is encrypted with CS to vacate space for watermark. The scheme takes the processed original image content as watermark, from which the characteristic digest values are generated. Comparing with the existing image authentication algorithms, the proposed scheme can realize n...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract- This paper proposes a novel image authentication scheme in the DWT domain. The scheme uses...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
An image authentication and tampering localization technique based on a wavelet-based digital waterm...
In this paper we propose a novel watermarking scheme for image authentication. A high localization o...
Image content authentication is to verify the integrity of the images, i.e. to check if the image ha...
Image content authentication is to verify the integrity of the images, i.e. to check if the image ha...
[[abstract]]Recently, the digital watermark technique has been proposed to solve the problem about h...
Watermarking techniques have recently become important in a number of applications. Fragile watermar...
Numerous image authentication techniques have been devised to address the potential security issue o...
[[abstract]]An effective image tamper localization and self-recovery scheme that uses the rehashing ...
In this paper we propose a novel watermarking scheme for image authentication. A high localization o...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper presents two fragile watermarking schemes for digital image authentication with tamper de...
Abstract- This paper proposes a novel image authentication scheme in the DWT domain. The scheme uses...
In this paper, a novel hash-based image content authentication scheme for tamper detection and local...
An image authentication and tampering localization technique based on a wavelet-based digital waterm...
In this paper we propose a novel watermarking scheme for image authentication. A high localization o...
Image content authentication is to verify the integrity of the images, i.e. to check if the image ha...
Image content authentication is to verify the integrity of the images, i.e. to check if the image ha...
[[abstract]]Recently, the digital watermark technique has been proposed to solve the problem about h...
Watermarking techniques have recently become important in a number of applications. Fragile watermar...
Numerous image authentication techniques have been devised to address the potential security issue o...
[[abstract]]An effective image tamper localization and self-recovery scheme that uses the rehashing ...
In this paper we propose a novel watermarking scheme for image authentication. A high localization o...
Numerous image authentication techniques have been devised to address the potential security issue o...
This paper proposes a novel semi-fragile watermarking scheme, which is robust against regular manipu...
Numerous image authentication techniques have been devised to address the potential security issue o...